Zeljka Zorz
PoS malware hit 54 Starwood luxury hotels
Starwood Hotels & Resorts, the international hotel chain that owns and operates hotels under the Westin, Sheraton, W Hotels, St. Regis, and Le Méridien brands, has …
ISIS operation security guide gives insight into group’s cybersecurity practices
Do ISIS terrorists use encryption, and if so, what tools do they favour?The Combating Terrorism Centre (CTC), an academic institution at the US Military Academy in West Point, …
Android adware tricks users into giving it power to secretly download other apps
Earlier this month Lookout revealed the existence of three adware families – Shuanet, ShiftyBug and Shedun – that secretly root Android devices and are extremely …
New Dyre variant can target Windows 10 and Microsoft Edge users
As Microsoft continues to push Windows users towards adopting the latest version of the popular OS, malware authors have started adding support for it. Heimdal Security …
PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials
Pastebins, apart from being a great help for programmers as they offer a place where one can store text online for a set period of time and share it with others, are also …
University implies they helped FBI break Tor protection because of a subpoena
Carnegie Mellon University has finally issued a statement commenting on the recent accusations that their researchers have aided the FBI to unmask a subset of Tor users …
Secure messaging service Telegram blocks 78 ISIS-related channels
Telegram, the popular instant messaging service that offers end-to-end encryption, announced on Wednesday that they have “blocked 78 ISIS-related channels across 12 …
A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption?
The recent Paris attacks by ISIS have become the perfect pretext for governments to resume their attack on encryption.Even though the New York Times pulled an article blaming …

Inside the largely unexplored world of mainframe security
The security of mainframe computers – the so-called “big iron”, which is mainly used by large organizations for critical applications, bulk data and …

Microsoft’s new security posture leads to baked-in security
More than ever, Microsoft wants its products to be the first choice for enterprises, organizations, and governments. And to do that, they embedded security in the …
Anonymous goes after ISIS, aims to expose recruiters and sympathizers
On Friday, the 13th of November, a slew of coordinated attacks executed by ISIS terrorists in Paris has resulted in the death of over 120 people in cafes, restaurants, a …
9271 crucial vulnerabilities found in 185 firmware images of embedded devices
A study into the security of the Internet of Things has confirmed that the web interfaces for user administration of commercial, off-the-shelf embedded devices – …
Featured news
Resources
Don't miss
- Many networking devices are still vulnerable to pixie dust attack
- Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader
- How a fake ICS network can reveal real cyberattacks
- Creating a compliance strategy that works across borders
- Rayhunter: EFF releases open-source tool to detect cellular spying